University of Oregon

Best Practices

Listed below are a number of resources regarding safe computing best practices. 

Start Here:

Pages

  • Security Checklist As students or employees of the University of Oregon, we are privileged to have access to a fast network. Acceptable Use of Computing Resources We are required to follow the...
  • KeePass is a fast, free, and open source program that securely saves account information and passwords directly onto your computer. Store tens or hundreds of passwords and remember only one! Note:...
  • This policy specifies that the Data Security Incident Response Procedure must be used in situations where paper or electronic records may have been exposed. See the full policy at http://policies....
  • The Information Services Tech Desk is committed to supporting University-affiliated students, faculty and staff with their computing needs. We are located in 151 McKenzie Hall, and our hours of...
  • CDs and DVDs are known as optical media because lasers are used to read and write data to the disc. There are two types of CDs and DVDs: recordable and rewritable. Recordable (abbreviated -R)...
  • This video explains how to protect yourself from scams, phishing, and other internet schemes. For more information, please contact our Technology Service Desk.
  • Malware is a term used to describe a broad category of damaging software that includes viruses, worms, trojan horses, rootkits, spyware, and adware. The effects of malware range from brief annoyance...
  • Encrypting files is an excellent way to protect your data from being stolen or compromised. When you encrypt your documents or hard drive, you make the information impossible to read without the...
  • 
Creating a Separate Data Partition During Installation
 OS X 10.5 and later    Open Disk Utility during installation.
 Select the hard drive you would like to partition and choose...
  • Types of Malware There are two major types of malicious software when it comes to Android. The first type is by far the most common; they are applications that spam you with ads or redirect you to a...
  •   What are cache and cookies? Cache are files (html, images, multimedia, etc) that are stored locally on your computer so the next time you return to a webpage you are shown the cached version....
  • In OS X 10.8 Mountain Lion and OS X 10.9 Mavericks, there are new default security settings. These new settings make it so that one can only download applications that were written by authorized...
  • Digital data may not get damaged or lost the way physical documents do, but that doesn't mean it's 100 percent safe. All of your digital files, photos, text documents, and probably a lot of you...
  • Time Machine is a common back up program native to OS X versions 10.5 or later. It can be used with any normal external hard drive or with Time Capsule, a wireless external hard drive sold by Apple...
  • Creating a Partition in Windows 7, Vista, and XP   Creating a separate data partition during installation
   During installation of Windows, you will eventually come to a screen that gives...
  • Peer-to-peer (P2P) filesharing software such as Gnutella, LimeWire, BitTorrent or AresWarez may seem like a convenient way to download music and movies, but this convenience is a double-edged sword...
  • Hardware Repair Advice & Accident Prevention    Fans & Vents Clean your fans and vents using a canister of canned air (you can find one at any large grocery store). First, find your...
  • This video provides tips and tricks for safe web browsing and creating secure passwords. For more information, contact the Technology Services Desk.
  • What is phishing? Phishing is a way of attempting to get your sensitive information such as usernames, passwords, PINs and ID numbers. Phishers accomplish this by imitating an often real organization...
  •   Security Resources & Information The UO Technology Service Desk is happy to assist all affiliated members of the university with securing a computer with an antivirus program or...
Syndicate content